Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
File Analysis Suite enable you to quickly and efficiently reduce information risk, analyze, optimize, and secure employee access to critical data. See how in @MicroFocusSec's new #DataProtection white paper: http://ms.spr.ly/60125enQj #DataSecurity #DataPrivacy #CyberResilience
๐Ÿ—ฃMicroFocus


๐ŸŽ–@malwr
Finding the right decompiler for Python bytecode can be a pain because there are so many.

I compiled this table to check the supported versions
๐Ÿ—ฃstruppigel


๐ŸŽ–@malwr
๐Ÿ‘1
If you want to know what its like to be grilled as a forensic expert watch this. From the Murdaugh trial today.
๐Ÿ—ฃMDCDF

Thanks. I hate it.
๐Ÿ‘คcarandfreedomgeek2

Solid one. Another is the kid in Michigan for that shooting. Thanks for posting a link OP!
๐Ÿ‘คbigt252002

When does the expert testimony start?
๐Ÿ‘คFabsudNalteb


๐ŸŽ–@malwr
New video drop! In this video, we'll explore more #yara basics by looking into #ascii versus #wide char strings. We'll also talk string obfuscation and use the #xor modifier.

https://youtu.be/J9Qr8Vfe9_s
๐Ÿ—ฃjstrosch


๐ŸŽ–@malwr
Indirect Prompt Injection on Bing Chat : https://greshake.github.io/

New ways of breaking app-integrated LLMs : https://github.com/greshake/llm-security

Paper : https://arxiv.org/pdf/2302.12173.pdf
๐Ÿ—ฃbinitamshah


๐ŸŽ–@malwr
Fortinet's James Slaughter writes about the MyDoom worm (also known as Novarg and Mimail) that was first discovered in 2004, but which continues to operate well beyond expectations, with fresh infections still occurring in the wild. https://www.fortinet.com/blog/threat-research/just-because-its-old-doesnt-mean-you-throw-it-away-including-malware
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Analysis of BlackLotus UEFI bootkit - Bypasses UEFI Secure Boot even on fully updated Windows 11 systems (It brings legit yet vulnerable binaries to the victim system to exploit CVE-2022-21894 & bypass UEFI Secure Boot) : https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/ credits @smolar_m
๐Ÿ—ฃbinitamshah


๐ŸŽ–@malwr
Trend Micro's Daniel Lunghi (@thehellu) details the update that Iron Tiger made to the custom malware family SysUpdate in its latest campaign. The custom malware now includes new features and has added malware infection support for the Linux platform. https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
cisagov/decider: A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&CKยฎ framework.
๐Ÿ—ฃjnazario

I guess I'm trying to understand the place of this tool. Is this the idea if you don't have an existing TIP feeding you intelligence to source and map things on your own?
๐Ÿ‘คasecuredlife

Can someone point me to the benefits of mapping adversary behaviours in the scope of an incident ? I always feel like I do this for higher management, rarely for myself in the scope of forensics/incident analysis. What do I miss?
๐Ÿ‘คbromomotatata


๐ŸŽ–@malwr